Journal: Computers & Security

Volume 27, Issue 7-8

233 -- 234Stephen D. Wolthusen. Editorial
235 -- 240Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen. Security beliefs and barriers for novice Internet users
241 -- 253Yacine Rezgui, Adam Marks. Information security awareness in higher education: An exploratory study
254 -- 259H. A. Kruger, W. D. Kearney. Consensus ranking - An ICT security awareness case study
260 -- 284Anthony J. Palmer. Criteria to evaluate Automated Personal Identification Mechanisms
285 -- 297Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis. An ontology-based policy for deploying secure SIP-based VoIP services
298 -- 308Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos. Secure log management for privacy assurance in electronic communications
309 -- 322Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez. An optimistic fair exchange protocol based on signature policies
323 -- 334Arati Baliga, Liviu Iftode, Xiaoxin Chen. Automated containment of rootkits attacks
335 -- 354Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. Evaluation of a low-rate DoS attack against application servers
355 -- 359Jose R. C. Piqueira, Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, Vanessa O. Araujo. Dynamic models for computer viruses